<?xml version='1.0' encoding='UTF-8'?><rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:openSearch="http://a9.com/-/spec/opensearchrss/1.0/" xmlns:blogger="http://schemas.google.com/blogger/2008" xmlns:georss="http://www.georss.org/georss" xmlns:gd="http://schemas.google.com/g/2005" xmlns:thr="http://purl.org/syndication/thread/1.0" version="2.0"><channel><atom:id>tag:blogger.com,1999:blog-2297109621104773367</atom:id><lastBuildDate>Sat, 31 Aug 2024 13:34:05 +0000</lastBuildDate><category>Trojan removal from vista</category><category>Lmok D</category><category>RIAs</category><category>SWF</category><category>computer science</category><category>flex</category><category>pripi</category><category>vipin</category><category>AVM</category><category>Action Script</category><category>Adobe AIR</category><category>Call stack</category><category>ECMAScript</category><category>Fifa 10</category><category>Fifa 10 download</category><category>Fifa 10 full version</category><category>HIIDeS</category><category>Hybrid Intelligent Intrusion Detection System</category><category>Magic XML</category><category>Rich Internet Applications</category><category>cet</category><category>code for web browser</category><category>control stack</category><category>dna authentication</category><category>dna computing in information secuirity</category><category>execution stack</category><category>fifa 09 10</category><category>fifa 09 download</category><category>fifa 09 full version</category><category>fifa 09 review</category><category>fifa 10 cheats</category><category>fifa 10 review</category><category>fifa 2009 download</category><category>fifa10</category><category>genetic algorithm</category><category>java code</category><category>java web browser</category><category>kerala university</category><category>main project</category><category>mini project</category><category>mini project report</category><category>mvc</category><category>runtime stack</category><category>seminar</category><category>stack winding</category><title>TECHNOLOGY - FACTS, NEWS, DEVELOPMENTS, SOLUTIONS</title><description>technology facts news - Trojans , programming languages , interesting protocols , games , new technologies , frameworks.</description><link>http://technology-facts.blogspot.com/</link><managingEditor>noreply@blogger.com (STRYKER)</managingEditor><generator>Blogger</generator><openSearch:totalResults>12</openSearch:totalResults><openSearch:startIndex>1</openSearch:startIndex><openSearch:itemsPerPage>25</openSearch:itemsPerPage><item><guid isPermaLink="false">tag:blogger.com,1999:blog-2297109621104773367.post-3693908453620901873</guid><pubDate>Mon, 21 Jun 2010 09:48:00 +0000</pubDate><atom:updated>2010-06-21T03:00:28.273-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">computer science</category><category domain="http://www.blogger.com/atom/ns#">genetic algorithm</category><category domain="http://www.blogger.com/atom/ns#">HIIDeS</category><category domain="http://www.blogger.com/atom/ns#">Hybrid Intelligent Intrusion Detection System</category><category domain="http://www.blogger.com/atom/ns#">main project</category><title>Hybrid Intelligent Intrusion Detection System ( HIIDeS)</title><description>&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;http://4.bp.blogspot.com/_5ZHrwjgUsrY/TB83Avk4iYI/AAAAAAAAH1M/wEZEzuxqiDM/s1600/intrusion-detection.jpg&quot;&gt;&lt;img style=&quot;display: block; margin: 0px auto 10px; text-align: center; cursor: pointer; width: 343px; height: 324px;&quot; src=&quot;http://4.bp.blogspot.com/_5ZHrwjgUsrY/TB83Avk4iYI/AAAAAAAAH1M/wEZEzuxqiDM/s400/intrusion-detection.jpg&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5485163357071247746&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;HIIDes or Hybrid Intelligent Intrusion Detection System was my final year main project.&lt;br /&gt;Here is a brief summary :&lt;br /&gt;&lt;br /&gt;The purpose of this project is to implement a Hybrid Intelligent Intrusion Detection System. In recent years, Intrusion detection system has been one of the most sought after research topics in the field of Information Security having huge applications in the cooperate world where data integrity and security is a complex issue.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;It is an important detection technology and is used as a countermeasure to preserve data integrity and system availability during an intrusion across various fields. When an intruder attempts to break into an information system or performs an action not legally allowed, as defined by the security policies of the system, we refer to this activity as an Intrusion. Intruders may be external or internal depending upon the authorization level. Intrusion techniques may include exploiting software bugs or system configurations, password cracking, sniffing unsecured traffic, or exploiting the design flaw of specific protocols. An intrusion detection system (IDS) is a device (or application) that monitors network activities for malicious activities or policy violations and produces reports to a Management Station.&lt;br /&gt;&lt;br /&gt;One of the major drawbacks of popular Intrusion Detection Systems is the fact that if an intrusion is not detected or if it is falsely detected, there is no option to change its behavior and it continues to make the same mistake each time. The objective of this project is to design a Hybrid Intelligent Intrusion Detection System (HIIDES) that is able to detect intrusions that violate the security policies of the system as well as evolve itself at the same time to learn from its mistakes with the help of Genetic Algorithm.&lt;br /&gt;&lt;br /&gt;For more details on the project mail me at vipinsreekumar19@gmail.com</description><link>http://technology-facts.blogspot.com/2010/06/hybrid-intelligent-intrusion-detection.html</link><author>noreply@blogger.com (STRYKER)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="http://4.bp.blogspot.com/_5ZHrwjgUsrY/TB83Avk4iYI/AAAAAAAAH1M/wEZEzuxqiDM/s72-c/intrusion-detection.jpg" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-2297109621104773367.post-4286972805028474825</guid><pubDate>Tue, 29 Dec 2009 05:49:00 +0000</pubDate><atom:updated>2009-12-29T01:43:52.198-08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">cet</category><category domain="http://www.blogger.com/atom/ns#">code for web browser</category><category domain="http://www.blogger.com/atom/ns#">computer science</category><category domain="http://www.blogger.com/atom/ns#">java code</category><category domain="http://www.blogger.com/atom/ns#">java web browser</category><category domain="http://www.blogger.com/atom/ns#">kerala university</category><category domain="http://www.blogger.com/atom/ns#">mini project</category><category domain="http://www.blogger.com/atom/ns#">mini project report</category><category domain="http://www.blogger.com/atom/ns#">vipin</category><title>Java Web Browser - Mini Project</title><description>&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;http://2.bp.blogspot.com/_5ZHrwjgUsrY/Szmeg38vtcI/AAAAAAAAHfc/KxTLu9obzZs/s1600-h/wb4.jpg&quot;&gt;&lt;img style=&quot;margin: 0px auto 10px; display: block; text-align: center; cursor: pointer; width: 400px; height: 251px;&quot; src=&quot;http://2.bp.blogspot.com/_5ZHrwjgUsrY/Szmeg38vtcI/AAAAAAAAHfc/KxTLu9obzZs/s400/wb4.jpg&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5420537914128840130&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;http://3.bp.blogspot.com/_5ZHrwjgUsrY/Szmegk_5L8I/AAAAAAAAHfU/A7WRxTxYpSk/s1600-h/wb1.jpg&quot;&gt;&lt;img style=&quot;margin: 0px auto 10px; display: block; text-align: center; cursor: pointer; width: 400px; height: 251px;&quot; src=&quot;http://3.bp.blogspot.com/_5ZHrwjgUsrY/Szmegk_5L8I/AAAAAAAAHfU/A7WRxTxYpSk/s400/wb1.jpg&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5420537909041770434&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;I am a Computer Science, Engineering Student from CET. For my mini project in 2nd year i made a web browser in Java programming language. It basically consisted of 3 files -toolbar  for different functionality , the web page retrieval part, and the main coordinating file. I also inlcuded and additional file to include database functionality which was as per syllabus even though a real web browser doesnt need a database. I used MySQL database and connected it to the browser using a fourth file for storing the history details of pages visited.&lt;br /&gt;&lt;br /&gt;The main advantages of my web browser was&lt;br /&gt;1. It was very small in size less than half an MB.&lt;br /&gt;2. Its suitable for educational purposes and small systems with memory constraints for easy browsing.&lt;br /&gt;3. No pop ups came and it was secure than all present browsers but it not capable of running flash and other rich web applications.&lt;br /&gt;4. Platform independent.&lt;br /&gt;5. Requires minimum resources to work&lt;br /&gt;6. Multiple Tab s facility.&lt;br /&gt;7. New windows.&lt;br /&gt;8. Proxy and port setting facilities. etc.&lt;br /&gt;&lt;br /&gt;I used NET BEANS IDE for coding. If anyone is interested in developing it further or using it as project material feel free to contact me at &lt;span style=&quot;font-weight: bold; font-style: italic;&quot;&gt;vipinsreekumar19@gmail.com&lt;/span&gt; and  i will mail my entire work.&lt;br /&gt;thank you.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;Here are some screen shots.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;http://2.bp.blogspot.com/_5ZHrwjgUsrY/Szmehr3oMZI/AAAAAAAAHfs/WUn8emw8oMk/s1600-h/wb6.jpg&quot;&gt;&lt;img style=&quot;margin: 0px auto 10px; display: block; text-align: center; cursor: pointer; width: 400px; height: 251px;&quot; src=&quot;http://2.bp.blogspot.com/_5ZHrwjgUsrY/Szmehr3oMZI/AAAAAAAAHfs/WUn8emw8oMk/s400/wb6.jpg&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5420537928066019730&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;http://3.bp.blogspot.com/_5ZHrwjgUsrY/Szmehc-uUwI/AAAAAAAAHfk/Pwq4VVTSQGI/s1600-h/wb5.jpg&quot;&gt;&lt;img style=&quot;margin: 0px auto 10px; display: block; text-align: center; cursor: pointer; width: 400px; height: 251px;&quot; src=&quot;http://3.bp.blogspot.com/_5ZHrwjgUsrY/Szmehc-uUwI/AAAAAAAAHfk/Pwq4VVTSQGI/s400/wb5.jpg&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5420537924069249794&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;</description><link>http://technology-facts.blogspot.com/2009/12/java-web-browser-mini-project.html</link><author>noreply@blogger.com (STRYKER)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="http://2.bp.blogspot.com/_5ZHrwjgUsrY/Szmeg38vtcI/AAAAAAAAHfc/KxTLu9obzZs/s72-c/wb4.jpg" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-2297109621104773367.post-4672331687503297721</guid><pubDate>Sun, 27 Dec 2009 07:39:00 +0000</pubDate><atom:updated>2010-11-10T11:32:18.388-08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">dna authentication</category><category domain="http://www.blogger.com/atom/ns#">dna computing in information secuirity</category><category domain="http://www.blogger.com/atom/ns#">seminar</category><category domain="http://www.blogger.com/atom/ns#">vipin</category><title>Seminar on DNA Computing in Security Practices</title><description>&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;http://3.bp.blogspot.com/_5ZHrwjgUsrY/SzcRVZkMpHI/AAAAAAAAHfA/LrdDv0cXa6w/s1600-h/mayaii-2143_web.jpg&quot;&gt;&lt;img style=&quot;margin: 0px auto 10px; display: block; text-align: center; cursor: pointer; width: 400px; height: 300px;&quot; src=&quot;http://3.bp.blogspot.com/_5ZHrwjgUsrY/SzcRVZkMpHI/AAAAAAAAHfA/LrdDv0cXa6w/s400/mayaii-2143_web.jpg&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5419819735901316210&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;br /&gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;http://4.bp.blogspot.com/_5ZHrwjgUsrY/SzcRUTIBa5I/AAAAAAAAHe4/hWz1EE16n8I/s1600-h/GordonMoore_2_2005.jpg&quot;&gt;&lt;img style=&quot;margin: 0px auto 10px; display: block; text-align: center; cursor: pointer; width: 225px; height: 346px;&quot; src=&quot;http://4.bp.blogspot.com/_5ZHrwjgUsrY/SzcRUTIBa5I/AAAAAAAAHe4/hWz1EE16n8I/s400/GordonMoore_2_2005.jpg&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5419819716992658322&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;I recently did a seminar on DNA Computing and its ever growing applications as part of my final year engineering project. I focused on its applications in security field mainly DNA Encrpytion, DNA Authentication and DNA Certification. I have made a power point presentation for the same. I made the seminar based on an IEEE paper published recently. Its a interesting topic which will have huge applications in the future. If anyone is interested in taking up the seminar on it please mail me at &lt;span style=&quot;font-weight: bold;&quot;&gt;vipinsreekumar19@gmail.com&lt;/span&gt; and  i will mail you my seminar and ppt.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;http://2.bp.blogspot.com/_5ZHrwjgUsrY/SzcRTyrlk6I/AAAAAAAAHeo/VLMCTp3Augg/s1600-h/c_20_L.jpg&quot;&gt;&lt;img style=&quot;margin: 0px auto 10px; display: block; text-align: center; cursor: pointer; width: 342px; height: 99px;&quot; src=&quot;http://2.bp.blogspot.com/_5ZHrwjgUsrY/SzcRTyrlk6I/AAAAAAAAHeo/VLMCTp3Augg/s400/c_20_L.jpg&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5419819708283458466&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;</description><link>http://technology-facts.blogspot.com/2009/12/seminar-on-dna-computing-in-security.html</link><author>noreply@blogger.com (STRYKER)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="http://3.bp.blogspot.com/_5ZHrwjgUsrY/SzcRVZkMpHI/AAAAAAAAHfA/LrdDv0cXa6w/s72-c/mayaii-2143_web.jpg" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-2297109621104773367.post-9216406699207256412</guid><pubDate>Tue, 07 Jul 2009 12:34:00 +0000</pubDate><atom:updated>2009-07-07T05:47:42.569-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">fifa 09 10</category><category domain="http://www.blogger.com/atom/ns#">Fifa 10</category><category domain="http://www.blogger.com/atom/ns#">fifa 10 cheats</category><category domain="http://www.blogger.com/atom/ns#">Fifa 10 download</category><category domain="http://www.blogger.com/atom/ns#">Fifa 10 full version</category><category domain="http://www.blogger.com/atom/ns#">fifa 10 review</category><category domain="http://www.blogger.com/atom/ns#">fifa10</category><title>FIFA 10 out on august 19</title><description>All you FIFA gamers out there would be waiting anxiously for the release of fifa 10. Here s sneak peak on whats installed! The new trailer that&#39;s just out&lt;br /&gt;&lt;br /&gt;&lt;object width=&quot;560&quot; height=&quot;340&quot;&gt;&lt;param name=&quot;movie&quot; value=&quot;http://www.youtube.com/v/wEVZ5BxmUns&amp;amp;hl=en&amp;amp;fs=1&amp;amp;&quot;&gt;&lt;param name=&quot;allowFullScreen&quot; value=&quot;true&quot;&gt;&lt;param name=&quot;allowscriptaccess&quot; value=&quot;always&quot;&gt;&lt;embed src=&quot;http://www.youtube.com/v/wEVZ5BxmUns&amp;amp;hl=en&amp;amp;fs=1&amp;amp;&quot; type=&quot;application/x-shockwave-flash&quot; allowscriptaccess=&quot;always&quot; allowfullscreen=&quot;true&quot; width=&quot;560&quot; height=&quot;340&quot;&gt;&lt;/embed&gt;&lt;/object&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;a href=&quot;http://www.youtube.com/watch?v=wEVZ5BxmUns&quot;&gt;http://www.youtube.com/watch?v=wEVZ5BxmUns&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;The graphics is looking much better than 09 with attention being given to face features and expressions. Also the gameplay is expected to be much easier yet challenging at the same time. The mouse controls introduced for the 1st time in 09 will be considerably improved as well. For more news and updates stay tuned to &lt;a href=&quot;http://technology-facts.blogspot.com/&quot;&gt;TECH -NEWS  &amp;amp; FACTS&lt;/a&gt;.  We wil bring you the reviews as soon as the game is released. Stay tuned for patches, bug s ,cheats, tricks and more on Fifa 10. Fifa 10 releases on august 19th.</description><link>http://technology-facts.blogspot.com/2009/07/fifa-10-out-on-august-19.html</link><author>noreply@blogger.com (STRYKER)</author><thr:total>1</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-2297109621104773367.post-2212146452748163991</guid><pubDate>Thu, 18 Sep 2008 05:04:00 +0000</pubDate><atom:updated>2008-09-18T01:48:10.098-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">fifa 09 download</category><category domain="http://www.blogger.com/atom/ns#">fifa 09 full version</category><category domain="http://www.blogger.com/atom/ns#">fifa 09 review</category><category domain="http://www.blogger.com/atom/ns#">fifa 2009 download</category><title>FIFA 09 review , PC version</title><description>&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;http://2.bp.blogspot.com/_5ZHrwjgUsrY/SNIPxE4FdZI/AAAAAAAAEjI/-oM7HLp3EeA/s1600-h/fifa09.jpg&quot;&gt;&lt;img style=&quot;margin: 0px auto 10px; display: block; text-align: center; cursor: pointer;&quot; src=&quot;http://2.bp.blogspot.com/_5ZHrwjgUsrY/SNIPxE4FdZI/AAAAAAAAEjI/-oM7HLp3EeA/s200/fifa09.jpg&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5247273851637036434&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;br /&gt;Ever since the popularity of Fifa2002 , EA sports has given lot of attention in the making of fifa series having been one of the most sought after PC sport games of all times. The advent of Fifa 2002 saw rapid improvements in the game play and made EA sports FIFA series a favorite pass time for all football fans and lovers around the world.&lt;br /&gt;&lt;br /&gt;EA sports has been coming up with new FIFA versions every year ever since and FIFA 09 is the latest installment that is about to hit the market. I have tried the Fifa 09 demo version for PC and will give a short review on it.&lt;br /&gt;&lt;br /&gt;The graphics has been improved from FIFA 08 though not on a scale that one would have imagined having played PES ( Pro Evolution Soccer) who is now the closest competitor to the EA FIFA series.&lt;br /&gt;&lt;br /&gt;The major option that has been provided is the new mouse plus keyboad controls that would make playing a lot easier for a new player though i felt it still needs perfection. From the point of view of an old player i doubt it will make any difference though the splitting of controls in the keyborad like for example lobbing and sliding tackle as two separte functions would make playing with keyboard alone a lot more complicated affair. Though the full version may have sorted this out, the demo lacks seriously with this respect as an old player will find it quite irritating.&lt;br /&gt;&lt;br /&gt;On the whole the new stadium looks, fans look and player look is better the game play still remains same though the level of difficulty may have been reduced compared to 08.&lt;br /&gt;&lt;br /&gt;So i will &lt;span style=&quot;font-weight: bold;&quot;&gt;rate the demo of FIFA 09 2/5&lt;/span&gt;.&lt;br /&gt;&lt;br /&gt;If u are a new player buying fifa 09 would be exciting but if u already own fifa 08 i would suggest you not buy it.&lt;br /&gt;&lt;br /&gt;On a high note this is just the demo and the full version may be lot better.&lt;br /&gt;&lt;br /&gt;&lt;a href=&quot;http://eu.llnet.eadownloads.ea.com/u/f/easports/fifa/fifa09/fifa09_demo_eu.exe&quot;&gt;&lt;br /&gt;Click here to download Fifa 09 demo PC version for yourself&lt;/a&gt;</description><link>http://technology-facts.blogspot.com/2008/09/fifa-09-review-pc-version.html</link><author>noreply@blogger.com (STRYKER)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="http://2.bp.blogspot.com/_5ZHrwjgUsrY/SNIPxE4FdZI/AAAAAAAAEjI/-oM7HLp3EeA/s72-c/fifa09.jpg" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-2297109621104773367.post-5256811500316570905</guid><pubDate>Sat, 09 Aug 2008 11:00:00 +0000</pubDate><atom:updated>2008-08-16T22:38:47.765-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Action Script</category><category domain="http://www.blogger.com/atom/ns#">flex</category><category domain="http://www.blogger.com/atom/ns#">Magic XML</category><category domain="http://www.blogger.com/atom/ns#">Rich Internet Applications</category><category domain="http://www.blogger.com/atom/ns#">SWF</category><title>What is MXML or Magic XML ?</title><description>&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;http://2.bp.blogspot.com/_5ZHrwjgUsrY/SJ18p03TTUI/AAAAAAAAEeE/6IG8TYQXpes/s1600-h/credits.jpg&quot;&gt;&lt;img style=&quot;margin: 0px auto 10px; display: block; text-align: center; cursor: pointer;&quot; src=&quot;http://2.bp.blogspot.com/_5ZHrwjgUsrY/SJ18p03TTUI/AAAAAAAAEeE/6IG8TYQXpes/s200/credits.jpg&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5232475400081460546&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;br /&gt;MXML or Magic EXTENSIBLE Markup Language ( which being a backronym) is a user interface markup language based on XML introduced in March, 2004 by Macomedia. Though there has been no official acronym for MXML it has been called Magic XML by many developers through out the world. The story of MXML can be considered to have taken a  new form in December 2005 , when Macromedia  was taken over by Adobe Systems.&lt;br /&gt;&lt;br /&gt;It has been widely used ever since to develop RIA s( Rich Internet  Applications) in combination with &lt;a href=&quot;http://technology-facts.blogspot.com/2008/07/what-is-action-script.html&quot;&gt;Action Script&lt;/a&gt; ( also a language developed by Macromedia similar to Java in certain respects). It is used to layout the interface of client side applications.&lt;br /&gt;&lt;br /&gt;Its language syntax includes using &#39; { &#39; (curly brackets ) to force evaluation of expression and &#39; . &#39; ( dot operator) to drill down through an object. It is used with Flex server as well as free &lt;a href=&quot;http://technology-facts.blogspot.com/2008/07/whats-is-adobe-flex.html&quot;&gt;Flex&lt;/a&gt; SDK( Standard Development Kit) to generate SWF( Shockwave Flash ) files.</description><link>http://technology-facts.blogspot.com/2008/08/what-is-mxml-or-magic-xml.html</link><author>noreply@blogger.com (STRYKER)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="http://2.bp.blogspot.com/_5ZHrwjgUsrY/SJ18p03TTUI/AAAAAAAAEeE/6IG8TYQXpes/s72-c/credits.jpg" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-2297109621104773367.post-2150451406887879630</guid><pubDate>Sat, 02 Aug 2008 07:54:00 +0000</pubDate><atom:updated>2008-08-16T22:39:06.891-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Lmok D</category><category domain="http://www.blogger.com/atom/ns#">Trojan removal from vista</category><title>How to remove Lmok D from vista ?</title><description>&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;http://2.bp.blogspot.com/_5ZHrwjgUsrY/SJQUo_jUjmI/AAAAAAAAEdk/9mfBth_tSGM/s1600-h/sick_computer.gif&quot;&gt;&lt;img style=&quot;margin: 0px auto 10px; display: block; text-align: center; cursor: pointer;&quot; src=&quot;http://2.bp.blogspot.com/_5ZHrwjgUsrY/SJQUo_jUjmI/AAAAAAAAEdk/9mfBth_tSGM/s200/sick_computer.gif&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5229827761770892898&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;br /&gt;Lmok D was a trojan which my Anti-spy in yahoo tool bar detected. Though it was mentioned in some sites we needed to uninstall programs like bit comet to remove it i found out it can be removed if we run anti-spy separately from the program folder instead of the web browser. If its being used in vista to remove Lmok D first go to the program folder where anti-spy is installed and then run the programs using run as administrator option which can be found by right clicking on file to be run. Then scan it as usual and it will remove it without showing any errors. We wont have to uninstall any programs or go through any other procedures. Please comment if you have any doubts.</description><link>http://technology-facts.blogspot.com/2008/08/how-to-remove-lmok-d-from-vista.html</link><author>noreply@blogger.com (STRYKER)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="http://2.bp.blogspot.com/_5ZHrwjgUsrY/SJQUo_jUjmI/AAAAAAAAEdk/9mfBth_tSGM/s72-c/sick_computer.gif" height="72" width="72"/><thr:total>9</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-2297109621104773367.post-315713468273133285</guid><pubDate>Fri, 01 Aug 2008 15:08:00 +0000</pubDate><atom:updated>2008-08-16T22:40:27.941-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Call stack</category><category domain="http://www.blogger.com/atom/ns#">control stack</category><category domain="http://www.blogger.com/atom/ns#">execution stack</category><category domain="http://www.blogger.com/atom/ns#">runtime stack</category><category domain="http://www.blogger.com/atom/ns#">stack winding</category><title>What is a Call Stack ?</title><description>&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;http://3.bp.blogspot.com/_5ZHrwjgUsrY/SJM5ev7bUfI/AAAAAAAAEdc/4EeId7_XLJQ/s1600-h/dock-stack.jpg&quot;&gt;&lt;img style=&quot;margin: 0px auto 10px; display: block; text-align: center; cursor: pointer;&quot; src=&quot;http://3.bp.blogspot.com/_5ZHrwjgUsrY/SJM5ev7bUfI/AAAAAAAAEdc/4EeId7_XLJQ/s200/dock-stack.jpg&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5229586792731857394&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;br /&gt;Call stack often referred to as function stack, execution stack, control stack , run time stack or &#39; THE STACK &#39; is a dynamic stack data structure which holds information like addresses of active sub routines of the program which is under consideration.&lt;br /&gt;&lt;br /&gt;Adding an entry into this stack is called winding and similarly removing an entry is called unwinding. Stack overflow may occur during memory shortage. Call stacks are usually hidden from programmers in high level programming and are given access only to certain specific functions.</description><link>http://technology-facts.blogspot.com/2008/08/what-is-call-stack.html</link><author>noreply@blogger.com (STRYKER)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="http://3.bp.blogspot.com/_5ZHrwjgUsrY/SJM5ev7bUfI/AAAAAAAAEdc/4EeId7_XLJQ/s72-c/dock-stack.jpg" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-2297109621104773367.post-4410622774065120152</guid><pubDate>Sat, 26 Jul 2008 02:38:00 +0000</pubDate><atom:updated>2008-08-16T22:39:24.757-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">AVM</category><category domain="http://www.blogger.com/atom/ns#">ECMAScript</category><category domain="http://www.blogger.com/atom/ns#">RIAs</category><category domain="http://www.blogger.com/atom/ns#">SWF</category><title>what is Action Script ?</title><description>&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;http://3.bp.blogspot.com/_5ZHrwjgUsrY/SIqRVdJt0KI/AAAAAAAAEcw/9UWYGa3ZiPg/s1600-h/fig01.jpg&quot;&gt;&lt;img style=&quot;margin: 0px auto 10px; display: block; text-align: center; cursor: pointer;&quot; src=&quot;http://3.bp.blogspot.com/_5ZHrwjgUsrY/SIqRVdJt0KI/AAAAAAAAEcw/9UWYGa3ZiPg/s200/fig01.jpg&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5227150115305541794&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;br /&gt;Action Script is an object oriented scripting language designed by Garry Grossman of Macromedia, used for developing and deploying websites and software is the Adobe Flash Player platform ie  in the form of SWF files embedded in web pages ( RIA s- Rich Internet Applications) based on &lt;a href=&quot;http://www.ecma-international.org/publications/standards/Ecma-262.htm&quot;&gt;ECMAScript&lt;/a&gt;. Though owned by Macromedia it is now fully owned by &lt;a href=&quot;http://www.adobe.com/&quot;&gt;Adobe&lt;/a&gt; after it took over Macromedia.&lt;br /&gt;&lt;br /&gt;Though it first appeared as a very simple scripting language in 1998, it has now  many features available which makes it  a flexible programming language for  web applications.  The files coded i n Action Script have the extension &#39;.as&#39; .&lt;br /&gt;&lt;br /&gt;Action Script combined with MXML makes GUI programming very easy. Flex uses Action Script and MXML to design RIA s. It is preferred above Java at client side programming while Java is used at the server side. Compared to java, Action scripts provides balance between static and dynamic languages by allowing you to program in both Java and JavaScript styles.&lt;br /&gt;&lt;br /&gt;The latest version is Action Script 3.0 released in June 27, 2006. It runs on ActionScript Virtual Machine (AVM) in &lt;a href=&quot;http://www.adobe.com/shockwave/download/download.cgi?P1_Prod_Version=shockwaveFlash&quot;&gt;Flash Player 9 &lt;/a&gt;.</description><link>http://technology-facts.blogspot.com/2008/07/what-is-action-script.html</link><author>noreply@blogger.com (STRYKER)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="http://3.bp.blogspot.com/_5ZHrwjgUsrY/SIqRVdJt0KI/AAAAAAAAEcw/9UWYGa3ZiPg/s72-c/fig01.jpg" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-2297109621104773367.post-253535844563439930</guid><pubDate>Mon, 21 Jul 2008 13:11:00 +0000</pubDate><atom:updated>2008-08-16T22:39:06.891-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Lmok D</category><category domain="http://www.blogger.com/atom/ns#">pripi</category><category domain="http://www.blogger.com/atom/ns#">Trojan removal from vista</category><title>Lmok D - Trojan</title><description>&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;http://2.bp.blogspot.com/_5ZHrwjgUsrY/SISNDJXTfSI/AAAAAAAAEb4/H4kjnvD14d8/s1600-h/trojanhorse.jpg&quot;&gt;&lt;img style=&quot;margin: 0px auto 10px; display: block; text-align: center; cursor: pointer; width: 140px; height: 154px;&quot; src=&quot;http://2.bp.blogspot.com/_5ZHrwjgUsrY/SISNDJXTfSI/AAAAAAAAEb4/H4kjnvD14d8/s200/trojanhorse.jpg&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5225456552849407266&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;br /&gt;Lmok D is a trojan that i found in my computer while scanning using yahoo tool bar sypware detector. It was released on July 10 , 2008 and  i have so far not been able to find a suitable solution to remove it. It has not been detected by any anti-virus softwares i used like MaAfee etc.&lt;br /&gt;&lt;br /&gt;According to the details shown in ca.com it has high overall risk. The files associated to it are zzqlihoxnsn.dll, fxptjkc.exe, hxolwhnjrhs.exe, zzqlihoxnsn.dll, hxolwhnjrhs.exe, and fxptjkc.exe.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;I  will post a suitable removal techniques for it once i find it. Since its just a week old removal updates may not be available yet. If anyone knows how to remove it or knows any other helpful details on it please comment here.</description><link>http://technology-facts.blogspot.com/2008/07/lmok-d-trojan.html</link><author>noreply@blogger.com (STRYKER)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="http://2.bp.blogspot.com/_5ZHrwjgUsrY/SISNDJXTfSI/AAAAAAAAEb4/H4kjnvD14d8/s72-c/trojanhorse.jpg" height="72" width="72"/><thr:total>2</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-2297109621104773367.post-3425123809958316505</guid><pubDate>Mon, 21 Jul 2008 12:27:00 +0000</pubDate><atom:updated>2008-08-16T22:42:11.154-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">pripi</category><category domain="http://www.blogger.com/atom/ns#">Trojan removal from vista</category><title>What is a Trojan or Trojan horse ?</title><description>&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;http://1.bp.blogspot.com/_5ZHrwjgUsrY/SISJuNfCEQI/AAAAAAAAEbs/jkgJ536J_eQ/s1600-h/Turkey-the-Trojan-Horse.jpg&quot;&gt;&lt;img style=&quot;margin: 0px auto 10px; display: block; text-align: center; cursor: pointer;&quot; src=&quot;http://1.bp.blogspot.com/_5ZHrwjgUsrY/SISJuNfCEQI/AAAAAAAAEbs/jkgJ536J_eQ/s400/Turkey-the-Trojan-Horse.jpg&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5225452894643425538&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;br /&gt;Trojan or Trojan horse can be considered as a program with a hidden intent or agenda. It is a malware which is responsible for huge amounts of data loss and system failures around the world. To trojan a program would be to add subversive functions to a program making it potentially dangerous and a tool most often used by hackers.&lt;br /&gt;&lt;br /&gt;The name Trojan has been taken from the classical tale of &quot;Trojan house&quot; used in the legendary war. It was coined by Daniel Edwards of NSA who was credited first to have discovered such programs in his report &quot;Computer Security Technology Planning Study&quot;. Trojans are classified on the basis of the way they attack into 6 trojan payloads : Remote Access , Data Destruction , Downloader ,Server Trojan, Security software disabler, Denial of Service attack.&lt;br /&gt;&lt;br /&gt;They cause lot of damage in the form of data destruction, corrupting files, disabling security features, downloading and uploading files, key logging etc.&lt;br /&gt;&lt;br /&gt;Due to these reasons protecting our system from trojans is of utmost importance and hence the trojan removal facilities has been included in all leading anti-virus programs. Sometimes separates patches may have to be downloaded and used to remove certain particular trojans as well. Due to the vast number of trojans reaching the internet each day one can never assume a system to be fully safe from its clutches.</description><link>http://technology-facts.blogspot.com/2008/07/what-is-trojan-or-trojan-horse.html</link><author>noreply@blogger.com (STRYKER)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="http://1.bp.blogspot.com/_5ZHrwjgUsrY/SISJuNfCEQI/AAAAAAAAEbs/jkgJ536J_eQ/s72-c/Turkey-the-Trojan-Horse.jpg" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-2297109621104773367.post-8112811510705016875</guid><pubDate>Sun, 20 Jul 2008 10:16:00 +0000</pubDate><atom:updated>2008-08-16T22:39:24.757-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Adobe AIR</category><category domain="http://www.blogger.com/atom/ns#">flex</category><category domain="http://www.blogger.com/atom/ns#">mvc</category><category domain="http://www.blogger.com/atom/ns#">RIAs</category><title>Whats is Adobe Flex?</title><description>&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;http://2.bp.blogspot.com/_5ZHrwjgUsrY/SIMht-dp8VI/AAAAAAAAEbU/mCUvjbUK80Q/s1600-h/flex3_fx_124x120.jpg&quot;&gt;&lt;img style=&quot;margin: 0px auto 10px; display: block; text-align: center; cursor: pointer;&quot; src=&quot;http://2.bp.blogspot.com/_5ZHrwjgUsrY/SIMht-dp8VI/AAAAAAAAEbU/mCUvjbUK80Q/s400/flex3_fx_124x120.jpg&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5225057066425119058&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;br /&gt;Ever wondered how it would be to to have a &#39;sign in&#39; button that would run away from the mouse pointer if the password you entered is wrong or to see multiple videos in a 3 D view all in the usual same old web browser, if anyone was under the delusion that such RIA s (Rich Internet Applications , those applications which exhibit Desktop application behavior  ) are not possible to be viewed in a web browser then its time to think again.&lt;br /&gt;&lt;br /&gt;Flex is a cross-platform open source development framework that allows you to create Rich Internet Applications (RIAs) which can be deployed in all leading web browsers and operating systems. Applications can be developed using Flex SDK. It is a component based tool used to develop applications that run using Flash Player or Adobe AIR(Adobe Integrated Runtime). It can be considered as a competitor to Ajax, JavaFX , Silverlight. It can be used to produce really cool applications with mind boggling effects.&lt;br /&gt;&lt;br /&gt;In Feb 2008 the Flex 3 SDK was released. Flex 4 codenamed Gumbo in expected to be released in 2009.&lt;br /&gt;&lt;br /&gt;See this sample that has come out http://flex.org/showcase/&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;http://3.bp.blogspot.com/_5ZHrwjgUsrY/SIMiUjbPxWI/AAAAAAAAEbk/KYWlCTKauME/s1600-h/whitebox.jpg&quot;&gt;&lt;img style=&quot;margin: 0px auto 10px; display: block; text-align: center; cursor: pointer;&quot; src=&quot;http://3.bp.blogspot.com/_5ZHrwjgUsrY/SIMiUjbPxWI/AAAAAAAAEbk/KYWlCTKauME/s400/whitebox.jpg&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5225057729182156130&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;br /&gt;Popular Misunderstandings : Flex is not a animation tool or server side language.&lt;br /&gt;Tag based MXML acts as basis for Flex projects. MXML is a custom XML namespace looks like &lt;mx:mytag&gt;&lt;/mx:MyTag&gt; . Actionscript3 can be used to add certain behaviors. Flex also supports common OOP practices like MVC patterns , etc. ( Model - View controller)&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;http://1.bp.blogspot.com/_5ZHrwjgUsrY/SIMiUoHZczI/AAAAAAAAEbc/iYSYQXuekww/s1600-h/firebrand2.png&quot;&gt;&lt;img style=&quot;margin: 0px auto 10px; display: block; text-align: center; cursor: pointer;&quot; src=&quot;http://1.bp.blogspot.com/_5ZHrwjgUsrY/SIMiUoHZczI/AAAAAAAAEbc/iYSYQXuekww/s400/firebrand2.png&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5225057730441081650&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;More details and discussions on the topic will be posted later on.</description><link>http://technology-facts.blogspot.com/2008/07/whats-is-adobe-flex.html</link><author>noreply@blogger.com (STRYKER)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="http://2.bp.blogspot.com/_5ZHrwjgUsrY/SIMht-dp8VI/AAAAAAAAEbU/mCUvjbUK80Q/s72-c/flex3_fx_124x120.jpg" height="72" width="72"/><thr:total>0</thr:total></item></channel></rss>